AI-powered secure development assistant tool with slash command integration for Cursor, Claude Code, and Gemini CLI.
Disclaimer
SecDevAI is currently in active development with various LLM models. Features, interfaces and behavior may change without notice. Use at your own risk and please report any issues you encounter. Contribution is welcome!
SecDevAI is an AI-powered secure development assistant that helps developers and security researchers build secure code. It provides security analysis with optional integration to existing security tools, supporting both targeted file/selection reviews and full codebase scans. The tool includes configurable rules covering OWASP Top 10 and common code patterns, making it valuable for both development teams and security researchers analyzing codebases and identifying vulnerabilities.
While Cursor, Claude Code, and Gemini CLI offer built-in AI code review capabilities, SecDevAI adds transparency and control over the security review contexts. This enables you to:
- Transparency: See exactly what security patterns and rules are being applied to your code
- Control: Customize and extend security contexts to match your organization's specific needs
- Continuous Improvement: Update and refine security review templates based on your team's experience and evolving threats
This approach allows you to continuously improve the quality of security review results, rather than relying on opaque, fixed AI models that you cannot modify or enhance.
- Slash Commands:
/secdevaiworks across Cursor, Claude Code, and Gemini CLI - Multi-Platform: Commands work identically across different AI assistant platforms
- Tool Integration: Optional integration with Bandit and Scorecard (expandable)
- Python-First: Initial focus on Python security patterns, expandable to other languages
- OWASP Top 10: Comprehensive coverage of OWASP Top 10 security risks
- Remediation: Provides code fixes with preview and approval workflow
- Security Research: Helpful for security researchers analyzing codebases and identifying vulnerabilities
Get up and running with SecDevAI in minutes. See the Quick Start Guide for step-by-step instructions on installation, initialization, and your first security review.
secdevai/
├── templates/ # Template system
│ ├── commands/ # Slash command templates
│ ├── context/ # Security analysis contexts
│ └── scripts/ # Helper scripts
├── src/secdevai_cli/ # CLI implementation
└── docs/ # Documentation
- Follow the Quick Start Guide to get started
- Read Usage Guide for detailed usage and advanced features
- Check Installation Guide for more installation options
- Read Contributing Guide to customize rules and contribute
- Make sure SecDevAI is installed:
secdevai --help - If using uv, ensure
~/.local/binis in your PATH
- Ensure you're running
secdevaifrom the project root - Check that
.secdevai/directory was created
- SecDevAI defaults to Cursor if no platform directories (
.cursor/,.claude/,.gemini/) are detected - If you want commands for Claude or Gemini, create the platform directory first:
mkdir -p .claude # Creates .claude/ directory secdevai # Will now detect and deploy to .claude/commands/
- Note: Gemini CLI uses
.tomlformat, so commands in.gemini/commands/will have.tomlextension, while Cursor and Claude use.mdformat - Alternatively, manually create the commands directories after initialization:
mkdir -p .claude/commands .gemini/commands cp .cursor/commands/* .claude/commands/ # Works for Claude (same .md format) # For Gemini, you'll need to convert .md to .toml format manually
This project is licensed under the MIT License